Research by MWR InfoSecurity found it’s possible to turn an Amazon Echo into a covert listening device without affecting its overall functionality. One big limiting factor: the process does involve the attacker being able to gain access to the physical unit, but it’s possible to tamper with the Echo without leaving any evidence.

“The key takeaway is about ensuring that if you’re producing a product that it has adequate security assessments and also if you’re planning on buying things and bringing them into your business, you want them in a secure, trusted location”